Data transparency design in internet of things: a systematic review

Y Long, X Luo, Y Zhu, KP Lee… - International Journal of …, 2024 - Taylor & Francis
Data transparency plays a critical role in understanding IoT privacy practices and making
informed decisions. To gain a comprehensive understanding of transparency in the IoT …

[PDF][PDF] Evasion attacks and defenses on smart home physical event verification

MO Ozmen, R Song, H Farrukh, ZB Celik - Network and Distributed …, 2023 - par.nsf.gov
In smart homes, when an actuator's state changes, it sends an event notification to the IoT
hub to report this change (eg, the door is unlocked). Prior works have shown that event …

Abuse Vectors: A Framework for Conceptualizing {IoT-Enabled} Interpersonal Abuse

S Stephenson, M Almansoori, P Emami-Naeini… - 32nd USENIX Security …, 2023 - usenix.org
Tech-enabled interpersonal abuse (IPA) is a pervasive problem. Abusers, often intimate
partners, use tools such as spyware to surveil and harass victim-survivors. Unfortunately …

" Get in Researchers; We're Measuring Reproducibility": A Reproducibility Study of Machine Learning Papers in Tier 1 Security Conferences

D Olszewski, A Lu, C Stillman, K Warren… - Proceedings of the …, 2023 - dl.acm.org
Reproducibility is crucial to the advancement of science; it strengthens confidence in
seemingly contradictory results and expands the boundaries of known discoveries …

" It's the Equivalent of Feeling Like You're in {Jail”}: Lessons from Firsthand and Secondhand Accounts of {IoT-Enabled} Intimate Partner Abuse

S Stephenson, M Almansoori, P Emami-Naeini… - 32nd USENIX Security …, 2023 - usenix.org
Victim-survivors of intimate partner violence (IPV) are facing a new technological threat:
Abusers are leveraging IoT devices such as smart thermostats, hidden cameras, and GPS …

Eye of Sauron:{Long-Range} Hidden Spy Camera Detection and Positioning with Inbuilt Memory {EM} Radiation

Q Zhang, D Liu, X Zhang, Z Cao, F Zeng… - 33rd USENIX Security …, 2024 - usenix.org
In this paper, we present ESauron—the first proof-of-concept system that can detect diverse
forms of spy cameras (ie, wireless, wired and offline devices) and quickly pinpoint their …

Sneaky spy devices and defective detectors: the ecosystem of intimate partner surveillance with covert devices

R Ceccio, S Stephenson, V Chadha… - 32nd USENIX Security …, 2023 - usenix.org
Recent anecdotal evidence suggests that abusers have begun to use covert spy devices
such as nanny cameras, item trackers, and audio recorders to spy on and stalk their …

Uncovering user interactions on smartphones via contactless wireless charging side channels

T Ni, X Zhang, C Zuo, J Li, Z Yan… - … IEEE Symposium on …, 2023 - ieeexplore.ieee.org
Today, there is an increasing number of smartphones supporting wireless charging that
leverages electromagnetic induction to transmit power from a wireless charger to the …

SoK: Pragmatic assessment of machine learning for network intrusion detection

G Apruzzese, P Laskov… - 2023 IEEE 8th European …, 2023 - ieeexplore.ieee.org
Machine Learning (ML) has become a valuable asset to solve many real-world tasks. For
Network Intrusion Detection (NID), however, scientific advances in ML are still seen with …

When Free Tier Becomes Free to Enter: A Non-Intrusive Way to Identify Security Cameras with no Cloud Subscription

Y He, Q He, S Fang, Y Liu - Proceedings of the 2023 ACM SIGSAC …, 2023 - dl.acm.org
Wireless security cameras may deter intruders. Accompanying the hardware, consumers
may pay recurring monthly fees for recording videos to the cloud, or use the free tier offering …